dom0+vm/qfile-copy: use setuid instead of policy setting to allow chroot
This will allow to not hardcode "root" username in policy, which can be useful for non-Linux systems.
This commit is contained in:
parent
7c64f909be
commit
0ea16ef21b
@ -3,4 +3,4 @@
|
|||||||
|
|
||||||
## Please use a single # to start your custom comments
|
## Please use a single # to start your custom comments
|
||||||
|
|
||||||
$anyvm $anyvm ask,user=root
|
$anyvm $anyvm ask
|
||||||
|
@ -398,7 +398,7 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
/usr/lib/qubes/meminfo-writer
|
/usr/lib/qubes/meminfo-writer
|
||||||
/usr/lib/qubes/network-manager-prepare-conf-dir
|
/usr/lib/qubes/network-manager-prepare-conf-dir
|
||||||
/usr/lib/qubes/qfile-agent
|
/usr/lib/qubes/qfile-agent
|
||||||
/usr/lib/qubes/qfile-unpacker
|
%attr(4755,root,root) /usr/lib/qubes/qfile-unpacker
|
||||||
/usr/lib/qubes/qopen-in-vm
|
/usr/lib/qubes/qopen-in-vm
|
||||||
/usr/lib/qubes/qrexec_agent
|
/usr/lib/qubes/qrexec_agent
|
||||||
/usr/lib/qubes/qrexec_client_vm
|
/usr/lib/qubes/qrexec_client_vm
|
||||||
|
Loading…
Reference in New Issue
Block a user